planning is done on a short-term basis to implement and control day-to-day operations

1._______________ planning is done on a short-term basis to implement and control day-to-day operations. 1. Strategic 2. Operational 3. Tactical 4. Scenario 2.The _______________ component of the business/IT planning process involves developing strategic plans for managing or outsourcing a company's IT resources. 1. resource management 2. technology architecture 3. strategic development 4. All of the choices are correct. 3.A situation where previously regulated markets are opening is a _______________ trend that is shaping strategic business/IT planning. 1. technology 2. competitive imperatives 3. deregulation 4. customer sophistication/expectations 4._______________ planning involves the setting of objectives and the development of procedures, rules, schedules, and budgets. 1. Strategic 2. Operational 3. Tactical 4. All of the choices are correct. 5._______________ are the potential for new business markets or innovative breakthroughs that might expand present markets. 1. Weaknesses 2. Opportunities 3. Threats 4. Strengths



6.Which of the following is the final stage of an organizational transformation?

1. Business scope redefinition
2. Localized implementation
3. Business process redesign
4. Business network redesign

7.According to the text case, the original Iridium organization failed because:

1. the company couldn't afford to keep the system updated.
2. Iridium focused on the wrong business.
3. the system was not operational before the company went through a merger.
4. satellite phones do not work indoors.

8.Which of the following are activities performed during the controlling project management phase?

1. Establish reporting obligations
2. Identify and sequence activities
3. Commit resources to specific tasks
4. Meet with stakeholders

9.According to the text, certain changes in _______________ may dictate the need for change, regardless of the assessed feasibility of such change.

1. the business environment
2. product specifications
3. management structure
4. technical system requirements

10.Which of the following is related to human factors feasibility?

1. Customer acceptance
2. How well the proposed system will fit with the existing organizational structure
3. Increased profits
4. Hardware capability




11.No matter what the project, all of the following elements are necessary except:

1. Prototypes
2. Process
3. Tools
4. Techniques

12.When a company needs to evaluate competing proposals for hardware or software acquisition:

1. Each evaluation factor is assigned an equal weight
2. Each evaluation factor is assigned a different number of points, depending on its importance to the company
3. The lowest bid is always the ultimate selection factor
4. Only three things matter: cost, performance, and support

13.Software packages that are _______________ aren't a good choice at any price.

1. slow
2. hard to use
3. poorly documented
4. All of the choices are correct.

14.All of the following are activities performed during the executing project management phase except:

1. Commit resources to specific tasks
2. Add additional resources/personnel if necessary
3. Writing a detailed project plan
4. Initiate project work

15.Software that is not copyrighted is called:

1. Shareware
2. Open source
3. Public domain
4. None of the choices are correct.

16.Sending extremely critical, derogatory, and often vulgar e-mail messages is called _______________.

1. flaming
2. spamming
3. spoofing
4. spying

17.According to the text, backup files:

1. Are duplicate files of data or programs
2. Can be used to reconstruct the original files if they are destroyed
3. May be stored off-premises, sometimes in special storage vaults in remote locations
4. All of the choices are correct.

18.A _______________ is software that can guess passwords.

1. logic bomb
2. password XXXXX
3. back door
4. sniffer

19.According to the text, all of the following statements are included in the definition of computer crime except:

1. Unauthorized modification of software, data, or network resources
2. Unauthorized release of information
3. Unauthorized copying of software
4. Unauthorized distribution of public domain software

20.The stockholder theory maintains that:

1. Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
2. Managers are agents of the organization's owners, and their only ethical responsibility is to increase the profits of the business without violating the law orengaging in fraudulent practices
3. Managers have an ethical responsibility to manage a firm for the benefit of all individuals and groups that have a claim on a company
4. Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business, without violating the law or engaging in fraudulent practices


21.According to the text, information technology has caused ethical controversy in all of the following basic categories of ethical business issues, except:

1. Intellectual property rights
2. Whistle blowing
3. Customer and employee privacy
4. Workplace safety

22.According to the text, COBIT is:

1. A methodology for determining the political structure of each country for IT operations
2. A popular methodology for developing complex global information systems
3. A popular IT governance approach that focuses on all aspects of the IT function throughout the organization
4. A method for evaluating the infrastructure capabilities for IT in the target country

23.The chief information officer is a(n) _______________ level IT manager.

1. tactical
2. strategic
3. operational
4. departmental

24.All of the following are among the top 10 factors in vendor selection except:

1. Commitment to quality
2. Price
3. End-user support
4. Cultural match

25.According to the text, if you are second-in-command to the CIO or chief technology officer and have years of applications development experience, your next promotion should be to:

1. COO
2. CEO
3. CIO
4. CTO

26.According to the text, many countries view the process of transborder data flows as violating their laws for all the reasons, except:

1. national sovereignty
2. privacy legislation
3. laws designed to protect the local IT industry from competition
4. anti-terrorist security precautions

27.All of the following would be associated with an international e-business strategy except:

1. Captive manufacturing
2. Global supply chain and logistics
3. Specific customers
4. Region specific

28.The _______________ has problem-solving skills and a degree in information systems, excellent interpersonal skills, good technical skills, and an ability to apply problem-solving and critical-thinking skills to the design of new systems.

1. Systems analyst
2. Practice manager
3. CIO
4. Team leader


Download A+ Rated Solution CLICK HERE
Password shiv for unlock .doc, .xls, .zip file 


Comments

Popular posts from this blog

You are given a choice of taking the simple interest on 100,000 invested for 2 years

Complete the spreadsheet template following Steps 1–10, building a comprehensive workbook of data and analyses that will inform your conclusions